Provably secure fog-based authentication protocol for VANETs

SM Awais, W Yucheng, K Mahmood, HMS Badar… - Computer Networks, 2024 - Elsevier
The integration of fog computing and vehicular ad-hoc networks (VANETs) has become
increasingly important due to advancements in cloud computing, Internet of Things (IoT) …

An efficient group signature based certificate less verification scheme for vehicular ad-hoc network

S Jayashree, SVNS Kumar - Wireless Networks, 2024 - Springer
Vehicular ad-hoc network (VANET) is widely applied in transportation applications to ensure
safety and security during road transportation. In VANET, all the information's are …

[HTML][HTML] BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques

J Xiao, C Li, Z Li, J Zhou - Scientific Reports, 2024 - nature.com
In this paper, we present a novel Secure Clustering Routing Method based on Blockchain
and Swarm Intelligence (BS-SCRM) for Wireless Sensor Networks (WSNs), which serves as …

PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks

S Jayashree, SVN Santhosh Kumar - Peer-to-Peer Networking and …, 2024 - Springer
In the emerging world the Vehicular Ad-hoc Network (VANET) plays a vital role in the
Intelligent Transportation Sector (ITS). Basically VANET are exposed rapid topology …

[HTML][HTML] RC-LAHR: Road-Side-Unit-Assisted Cloud-Based Location-Aware Hybrid Routing for Software-Defined Vehicular Ad Hoc Networks

M Kumar, RS Raw - Sensors, 2024 - mdpi.com
The reliability of the communication link is quite common and challenging to handle as the
topology changes frequently in vehicular ad hoc networks (VANETs). Another problem with …

An optimal secure and reliable certificateless proxy signature for industrial internet of things

R Ullah, A Mehmood, MA Khan, C Maple… - Peer-to-Peer Networking …, 2024 - Springer
Abstract Certificateless Proxy Signature (CLPS) offers a comprehensive authentication
mechanism to ensure the optimal solutions from modern forgery attacks in Industrial Internet …

Trust-based clustering and routing in WSNs using DST-WOA

S Singh, V Anand, S Yadav - Peer-to-Peer Networking and Applications, 2024 - Springer
Wireless sensor networks (WSNs) are increasingly being used in a variety of applications,
such as smart healthcare systems and the Internet of Things (IoT). Trust in WSNs is the …

Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)

P Radhakrishnan, PK Sugumar, P Ponnan… - Peer-to-Peer Networking …, 2024 - Springer
Abstract Wireless Sensor Networks has been characterized by a disseminated, structured,
and independent collection of sensor nodes deployed for broad variants of applications …

A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks

Y Rajkumar, SVN Kumar - Peer-to-Peer Networking and Applications, 2024 - Springer
Traffic data generated by the vehicles are often transported in a wide open wireless
communication channel which poses several security and privacy vulnerabilities. In case of …

Efficient Authentication Scheme for IoT in Smart Homes

A Srivastava, PK Saini, G Singh… - … on Power Energy …, 2023 - ieeexplore.ieee.org
In a smart home, all of the devices can talk to each other and the owner from anywhere in
the world, thanks to the internet connection. The term “authentication” is used to describe the …